„Computer Security & Cryptography“
Suchergebnisse
576 Treffer
-
Advances in Cryptology – ASIACRYPT 2025 – 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VII
-
Digitale Sicherheit für Senioren für Dummies
-
Theory of Cryptography – 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part III
-
Security and Privacy – 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings
-
Security and Privacy in Communication Networks – 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part I
-
Transactions on Pattern Languages of Programming V
-
Financial Cryptography and Data Security – 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
-
Financial Cryptography and Data Security – FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Privacy Technologies and Policy – 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV
-
Application and security of lattice-based cryptography in embedded systems
-
Die unsicheren Kanäle – Negative und queere Sicherheit in Kryptologie und Informatik
-
Die unsicheren Kanäle – Negative und queere Sicherheit in Kryptologie und Informatik
-
On Security Notions for Multi-Party Computation
-
ICT Innovations 2009
-
Effiziente Pixel-Kompression zur Optimierung der End-to-Display-Verschlüsselung
-
Cryptographic Protocols from Physical Assumptions
-
On the Relation between Efficiency, Security, and Practicality of Structured Lattices in Cryptography